CVE-2023-1027 – WP Meta SEO <= 4.5.3 - Missing Authorization in 'checkAllCategoryInSitemap'
https://notcve.org/view.php?id=CVE-2023-1027
The WP Meta SEO plugin for WordPress is vulnerable to unauthorized sitemap generation due to a missing capability check on the checkAllCategoryInSitemap function in versions up to, and including, 4.5.3. This makes it possible for authenticated attackers with subscriber-level access to obtain post categories. This vulnerability occurred as a result of the plugin relying on nonce checks as a means of access control, and that nonce being accessible to all authenticated users regardless of role. • https://plugins.trac.wordpress.org/changeset/2870465/wp-meta-seo/trunk?contextall=1&old=2869205&old_path=%2Fwp-meta-seo%2Ftrunk#file2 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2870465%40wp-meta-seo&new=2870465%40wp-meta-seo&sfp_email=&sfph_mail= https://www.wordfence.com/threat-intel/vulnerabilities/id/4f589e21-7417-4b43-b580-4f1d3c2041f4 • CWE-862: Missing Authorization •
CVE-2023-0876 – WP Meta SEO < 4.5.3 - Subscriber+ Improper Authorization causing Arbitrary Redirect
https://notcve.org/view.php?id=CVE-2023-0876
The WP Meta SEO WordPress plugin before 4.5.3 does not authorize several ajax actions, allowing low-privilege users to make updates to certain data and leading to an arbitrary redirect vulnerability. The WP Meta SEO plugin for WordPress is vulnerable to unauthorized execution of tasks due to a missing capability check on the startProcess function in versions up to, and including, 4.5.2. This makes it possible for authenticated attackers with subscriber-level access to perform tasks reserved for administrators such as post modifications. This vulnerability occurred as a result of the plugin relying on nonce checks as a means of access control, and that nonce being accessible to all authenticated users regardless of role. Attackers could leverage this to redirect victims to an arbitrary location by setting the link_redirect location through the update_link_redirect task. • https://wpscan.com/vulnerability/1a8c97f9-98fa-4e29-b7f7-bb9abe0c42ea • CWE-862: Missing Authorization •
CVE-2023-1023 – WP Meta SEO <= 4.5.3 - Missing Authorization in 'saveSitemapSettings'
https://notcve.org/view.php?id=CVE-2023-1023
The WP Meta SEO plugin for WordPress is vulnerable to unauthorized plugin settings update due to a missing capability check on the saveSitemapSettings function in versions up to, and including, 4.5.3. This makes it possible for authenticated attackers with subscriber-level access to change sitemap-related settings of the plugin. This vulnerability occurred as a result of the plugin relying on nonce checks as a means of access control, and that nonce being accessible to all authenticated users regardless of role. • https://plugins.trac.wordpress.org/changeset/2870465/wp-meta-seo/trunk?contextall=1&old=2869205&old_path=%2Fwp-meta-seo%2Ftrunk#file2 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2870465%40wp-meta-seo&new=2870465%40wp-meta-seo&sfp_email=&sfph_mail= https://www.wordfence.com/threat-intel/vulnerabilities/id/9d1e498a-ddcb-4c67-bf0d-bb45b6fe0e9d • CWE-862: Missing Authorization •
CVE-2023-0875 – WP Meta SEO < 4.5.3 - Subscriber+ SQLi
https://notcve.org/view.php?id=CVE-2023-0875
The WP Meta SEO WordPress plugin before 4.5.3 does not properly sanitize and escape inputs into SQL queries, leading to a blind SQL Injection vulnerability that can be exploited by subscriber+ users. The WP Meta SEO plugin for WordPress is vulnerable to SQL Injection via the ‘ids’ parameter in the bulkImageCopy function reachable via the wp_ajax_wpms AJAX action in versions up to, and including, 4.5.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Since the plugin relied on nonce checks as a means of access control, and that nonce was made accessible to all authenticated users regardless of role, the vulnerability could be exploited by asubscribers. • https://wpscan.com/vulnerability/d44e9a45-cbdf-46b1-8b48-7d934b617534 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2022-47602 – WordPress WP Table Manager Plugin <= 3.5.2 is vulnerable to Cross Site Scripting (XSS)
https://notcve.org/view.php?id=CVE-2022-47602
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in JoomUnited WP Table Manager plugin <= 3.5.2 versions. The WP Table Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting parameter in versions up to, and including, 3.5.2 due to insufficient input sanitization and output escaping on table cell values. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://patchstack.com/database/vulnerability/wp-table-manager/wordpress-wp-table-manager-plugin-3-5-2-cross-site-scripting-xss?_s_id=cve • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •